Lucene search

K
LinuxLinux Kernel

7807 matches found

CVE
CVE
added 2024/11/19 6:15 p.m.129 views

CVE-2024-53072

In the Linux kernel, the following vulnerability has been resolved: platform/x86/amd/pmc: Detect when STB is not available Loading the amd_pmc module as: amd_pmc enable_stb=1 ...can result in the following messages in the kernel ring buffer: amd_pmc AMDI0009:00: SMU cmd failed. err: 0xff ioremap on...

5.5CVSS5.4AI score0.00043EPSS
CVE
CVE
added 2024/12/24 12:15 p.m.129 views

CVE-2024-53155

In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix uninitialized value in ocfs2_file_read_iter() Syzbot has reported the following KMSAN splat: BUG: KMSAN: uninit-value in ocfs2_file_read_iter+0x9a4/0xf80ocfs2_file_read_iter+0x9a4/0xf80__io_read+0x8d4/0x20f0io_read+0x3e/...

7.1CVSS6.6AI score0.00039EPSS
CVE
CVE
added 2024/12/27 2:15 p.m.129 views

CVE-2024-53165

In the Linux kernel, the following vulnerability has been resolved: sh: intc: Fix use-after-free bug in register_intc_controller() In the error handling for this function, d is freed without everremoving it from intc_list which would lead to a use after free.To fix this, let's only add it to the li...

7.8CVSS6.5AI score0.00037EPSS
CVE
CVE
added 2024/12/27 2:15 p.m.129 views

CVE-2024-53213

In the Linux kernel, the following vulnerability has been resolved: net: usb: lan78xx: Fix double free issue with interrupt buffer allocation In lan78xx_probe(), the buffer buf was being freed twice: onceimplicitly through usb_free_urb(dev->urb_intr) with theURB_FREE_BUFFER flag and again explic...

7.8CVSS7.3AI score0.00039EPSS
CVE
CVE
added 2024/12/27 3:15 p.m.129 views

CVE-2024-56650

In the Linux kernel, the following vulnerability has been resolved: netfilter: x_tables: fix LED ID check in led_tg_check() Syzbot has reported the following BUG detected by KASAN: BUG: KASAN: slab-out-of-bounds in strlen+0x58/0x70Read of size 1 at addr ffff8881022da0c8 by task repro/5879...Call Tr...

7.1CVSS6.4AI score0.00039EPSS
CVE
CVE
added 2024/12/29 12:15 p.m.129 views

CVE-2024-56754

In the Linux kernel, the following vulnerability has been resolved: crypto: caam - Fix the pointer passed to caam_qi_shutdown() The type of the last parameter given to devm_add_action_or_reset() is"struct caam_drv_private *", but in caam_qi_shutdown(), it is casted to"struct device *". Pass the cor...

5.5CVSS6.5AI score0.00041EPSS
CVE
CVE
added 2025/01/15 1:15 p.m.129 views

CVE-2024-57902

In the Linux kernel, the following vulnerability has been resolved: af_packet: fix vlan_get_tci() vs MSG_PEEK Blamed commit forgot MSG_PEEK case, allowing a crash [1] as foundby syzbot. Rework vlan_get_tci() to not touch skb at all,so that it can be used from many cpus on the same skb. Add a const ...

5.5CVSS6.4AI score0.00037EPSS
CVE
CVE
added 2025/02/27 2:15 a.m.129 views

CVE-2024-57980

In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix double free in error path If the uvc_status_init() function fails to allocate the int_urb, it willfree the dev->status pointer but doesn't reset the pointer to NULL. Thisresults in the kfree() call in uvc_st...

7.8CVSS6.6AI score0.0003EPSS
CVE
CVE
added 2025/02/27 3:15 a.m.129 views

CVE-2024-58002

In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Remove dangling pointers When an async control is written, we copy a pointer to the file handlethat started the operation. That pointer will be used when the device isdone. Which could be anytime in the future. If ...

7.8CVSS6.5AI score0.00032EPSS
CVE
CVE
added 2025/02/12 2:15 p.m.129 views

CVE-2025-21697

In the Linux kernel, the following vulnerability has been resolved: drm/v3d: Ensure job pointer is set to NULL after job completion After a job completes, the corresponding pointer in the device mustbe set to NULL. Failing to do so triggers a warning when unloadingthe driver, as it appears the job ...

5.5CVSS6.5AI score0.00028EPSS
CVE
CVE
added 2025/03/12 10:15 a.m.129 views

CVE-2025-21864

In the Linux kernel, the following vulnerability has been resolved: tcp: drop secpath at the same time as we currently drop dst Xiumei reported hitting the WARN in xfrm6_tunnel_net_exit whilerunning tests that boil down to: create a pair of netns run a basic TCP test over ipcomp6 delete the pair of...

5.5CVSS6.5AI score0.00035EPSS
CVE
CVE
added 2004/08/06 4:0 a.m.128 views

CVE-2004-0495

Multiple unknown vulnerabilities in Linux kernel 2.4 and 2.6 allow local users to gain privileges or access kernel memory, as found by the Sparse source code checking tool.

7.2CVSS6.5AI score0.00056EPSS
CVE
CVE
added 2011/01/03 8:0 p.m.128 views

CVE-2010-3876

net/packet/af_packet.c in the Linux kernel before 2.6.37-rc2 does not properly initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_RAW capability to read copies of the applicable structures.

1.9CVSS5.6AI score0.00058EPSS
CVE
CVE
added 2011/02/02 11:0 p.m.128 views

CVE-2011-0521

The dvb_ca_ioctl function in drivers/media/dvb/ttpci/av7110_ca.c in the Linux kernel before 2.6.38-rc2 does not check the sign of a certain integer field, which allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a negative value.

7.2CVSS6.5AI score0.00113EPSS
CVE
CVE
added 2013/11/04 3:55 p.m.128 views

CVE-2013-4470

The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_COR...

6.9CVSS6.4AI score0.00122EPSS
CVE
CVE
added 2014/04/14 11:55 p.m.128 views

CVE-2014-0077

drivers/vhost/net.c in the Linux kernel before 3.13.10, when mergeable buffers are disabled, does not properly validate packet lengths, which allows guest OS users to cause a denial of service (memory corruption and host OS crash) or possibly gain privileges on the host OS via crafted packets, rela...

5.5CVSS6.6AI score0.00254EPSS
CVE
CVE
added 2014/11/10 11:55 a.m.128 views

CVE-2014-3687

The sctp_assoc_lookup_asconf_ack function in net/sctp/associola.c in the SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (panic) via duplicate ASCONF chunks that trigger an incorrect uncork within the side-effect interpreter.

7.8CVSS7.1AI score0.01819EPSS
CVE
CVE
added 2016/05/02 10:59 a.m.128 views

CVE-2016-1576

The overlayfs implementation in the Linux kernel through 4.5.2 does not properly restrict the mount namespace, which allows local users to gain privileges by mounting an overlayfs filesystem on top of a FUSE filesystem, and then executing a crafted setuid program.

7.8CVSS7.2AI score0.00352EPSS
CVE
CVE
added 2016/12/28 7:59 a.m.128 views

CVE-2016-9756

arch/x86/kvm/emulate.c in the Linux kernel before 4.8.12 does not properly initialize Code Segment (CS) in certain error cases, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.

5.5CVSS5.4AI score0.00031EPSS
CVE
CVE
added 2017/03/01 8:59 p.m.128 views

CVE-2017-6347

The ip_cmsg_recv_checksum function in net/ipv4/ip_sockglue.c in the Linux kernel before 4.10.1 has incorrect expectations about skb data layout, which allows local users to cause a denial of service (buffer over-read) or possibly have unspecified other impact via crafted system calls, as demonstrat...

7.8CVSS7.5AI score0.00086EPSS
CVE
CVE
added 2021/07/22 5:15 p.m.128 views

CVE-2021-29657

arch/x86/kvm/svm/nested.c in the Linux kernel before 5.11.12 has a use-after-free in which an AMD KVM guest can bypass access control on host OS MSRs when there are nested guests, aka CID-a58d9166a756. This occurs because of a TOCTOU race condition associated with a VMCB12 double fetch in nested_sv...

7.4CVSS7.1AI score0.00037EPSS
CVE
CVE
added 2024/03/04 6:15 p.m.128 views

CVE-2021-47094

In the Linux kernel, the following vulnerability has been resolved: KVM: x86/mmu: Don't advance iterator after restart due to yielding After dropping mmu_lock in the TDP MMU, restart the iterator duringtdp_iter_next() and do not advance the iterator. Advancing the iteratorresults in skipping the to...

7.1CVSS7.2AI score0.00009EPSS
CVE
CVE
added 2024/05/21 3:15 p.m.128 views

CVE-2021-47321

In the Linux kernel, the following vulnerability has been resolved: watchdog: Fix possible use-after-free by calling del_timer_sync() This driver's remove path calls del_timer(). However, that functiondoes not wait until the timer handler finishes. This means that thetimer handler may still be runn...

7.8CVSS6.6AI score0.00012EPSS
CVE
CVE
added 2024/05/21 3:15 p.m.128 views

CVE-2021-47385

In the Linux kernel, the following vulnerability has been resolved: hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field If driver read val value sufficient for(val & 0x08) && (!(val & 0x80)) && ((val & 0x7) == ((val >> 4) & 0x7))from device then Null pointer ...

5.5CVSS6.6AI score0.00009EPSS
CVE
CVE
added 2024/05/22 7:15 a.m.128 views

CVE-2021-47456

In the Linux kernel, the following vulnerability has been resolved: can: peak_pci: peak_pci_remove(): fix UAF When remove the module peek_pci, referencing 'chan' again afterreleasing 'dev' will cause UAF. Fix this by releasing 'dev' later. The following log reveals it: [ 35.961814 ] BUG: KASAN: use...

8.4CVSS8AI score0.00021EPSS
CVE
CVE
added 2022/12/23 5:15 p.m.128 views

CVE-2022-47943

An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. There is an out-of-bounds read and OOPS for SMB2_WRITE, when there is a large length in the zero DataOffset case.

8.1CVSS7.6AI score0.00868EPSS
CVE
CVE
added 2024/08/22 4:15 a.m.128 views

CVE-2022-48942

In the Linux kernel, the following vulnerability has been resolved: hwmon: Handle failure to register sensor with thermal zone correctly If an attempt is made to a sensor with a thermal zone and it fails,the call to devm_thermal_zone_of_sensor_register() may return -ENODEV.This may result in crashe...

5.5CVSS6.8AI score0.00037EPSS
CVE
CVE
added 2025/02/26 7:1 a.m.128 views

CVE-2022-49236

In the Linux kernel, the following vulnerability has been resolved: bpf: Fix UAF due to race between btf_try_get_module and load_module While working on code to populate kfunc BTF ID sets for module BTF fromits initcall, I noticed that by the time the initcall is invoked, themodule BTF can already ...

7.8CVSS5.3AI score0.00026EPSS
CVE
CVE
added 2025/02/26 7:1 a.m.128 views

CVE-2022-49328

In the Linux kernel, the following vulnerability has been resolved: mt76: fix use-after-free by removing a non-RCU wcid pointer Fixes an issue caught by KASAN about use-after-free in mt76_txq_scheduleby protecting mtxq->wcid with rcu_lock between mt76_txq_schedule andsta_info_[alloc, free]. [188...

7.8CVSS5.4AI score0.00011EPSS
CVE
CVE
added 2025/02/26 7:1 a.m.128 views

CVE-2022-49572

In the Linux kernel, the following vulnerability has been resolved: tcp: Fix data-races around sysctl_tcp_slow_start_after_idle. While reading sysctl_tcp_slow_start_after_idle, it can be changedconcurrently. Thus, we need to add READ_ONCE() to its readers.

4.7CVSS5.4AI score0.00032EPSS
CVE
CVE
added 2025/02/26 7:1 a.m.128 views

CVE-2022-49598

In the Linux kernel, the following vulnerability has been resolved: tcp: Fix data-races around sysctl_tcp_mtu_probing. While reading sysctl_tcp_mtu_probing, it can be changed concurrently.Thus, we need to add READ_ONCE() to its readers.

4.7CVSS5.4AI score0.0006EPSS
CVE
CVE
added 2023/01/17 9:15 p.m.128 views

CVE-2023-0122

A NULL pointer dereference vulnerability in the Linux kernel NVMe functionality, in nvmet_setup_auth(), allows an attacker to perform a Pre-Auth Denial of Service (DoS) attack on a remote machine. Affected versions v6.0-rc1 to v6.0-rc3, fixed in v6.0-rc4.

7.5CVSS7AI score0.00128EPSS
CVE
CVE
added 2023/02/26 11:15 p.m.128 views

CVE-2023-26606

In the Linux kernel 6.0.8, there is a use-after-free in ntfs_trim_fs in fs/ntfs3/bitmap.c.

7.8CVSS7.1AI score0.00017EPSS
CVE
CVE
added 2023/10/13 2:15 a.m.128 views

CVE-2023-42752

An integer overflow flaw was found in the Linux kernel. This issue leads to the kernel allocating skb_shared_info in the userspace, which is exploitable in systems without SMAP protection since skb_shared_info contains references to function pointers.

5.5CVSS6.3AI score0.00009EPSS
CVE
CVE
added 2024/01/16 3:15 p.m.128 views

CVE-2024-0582

A memory leak flaw was found in the Linux kernel’s io_uring functionality in how a user registers a buffer ring with IORING_REGISTER_PBUF_RING, mmap() it, and then frees it. This flaw allows a local user to crash or potentially escalate their privileges on the system.

7.8CVSS7.3AI score0.00439EPSS
CVE
CVE
added 2024/03/18 11:15 a.m.128 views

CVE-2024-26636

In the Linux kernel, the following vulnerability has been resolved: llc: make llc_ui_sendmsg() more robust against bonding changes syzbot was able to trick llc_ui_sendmsg(), allocating an skb with noheadroom, but subsequently trying to push 14 bytes of Ethernet header [1] Like some others, llc_ui_s...

5.5CVSS6.2AI score0.00007EPSS
CVE
CVE
added 2024/04/03 5:15 p.m.128 views

CVE-2024-26739

In the Linux kernel, the following vulnerability has been resolved: net/sched: act_mirred: don't override retval if we already lost the skb If we're redirecting the skb, and haven't called tcf_mirred_forward(),yet, we need to tell the core to drop the skb by setting the retcodeto SHOT. If we have c...

7.8CVSS6.3AI score0.0001EPSS
CVE
CVE
added 2024/04/03 5:15 p.m.128 views

CVE-2024-26757

In the Linux kernel, the following vulnerability has been resolved: md: Don't ignore read-only array in md_check_recovery() Usually if the array is not read-write, md_check_recovery() won'tregister new sync_thread in the first place. And if the array isread-write and sync_thread is registered, md_s...

5.5CVSS7AI score0.00011EPSS
CVE
CVE
added 2024/04/17 11:15 a.m.128 views

CVE-2024-26884

In the Linux kernel, the following vulnerability has been resolved: bpf: Fix hashtab overflow check on 32-bit arches The hashtab code relies on roundup_pow_of_two() to compute the number ofhash buckets, and contains an overflow check by checking if theresulting value is 0. However, on 32-bit arches...

7.8CVSS6.7AI score0.00011EPSS
CVE
CVE
added 2024/05/19 9:15 a.m.128 views

CVE-2024-35865

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in smb2_is_valid_oplock_break() Skip sessions that are being teared down (status == SES_EXITING) toavoid UAF.

5.5CVSS6.7AI score0.0001EPSS
CVE
CVE
added 2024/05/20 10:15 a.m.128 views

CVE-2024-35969

In the Linux kernel, the following vulnerability has been resolved: ipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr Although ipv6_get_ifaddr walks inet6_addr_lst under the RCU lock, itstill means hlist_for_each_entry_rcu can return an item that got removedfrom the list. The memor...

5.5CVSS6.5AI score0.00007EPSS
CVE
CVE
added 2024/06/19 2:15 p.m.128 views

CVE-2024-38573

In the Linux kernel, the following vulnerability has been resolved: cppc_cpufreq: Fix possible null pointer dereference cppc_cpufreq_get_rate() and hisi_cppc_cpufreq_get_rate() can be called fromdifferent places with various parameters. So cpufreq_cpu_get() can returnnull as 'policy' in some circum...

7.5CVSS7.8AI score0.0004EPSS
CVE
CVE
added 2024/07/12 1:15 p.m.128 views

CVE-2024-40919

In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Adjust logging of firmware messages in case of released token in __hwrm_send() In case of token is released due to token->state == BNXT_HWRM_DEFERRED,released token (set to NULL) is used in log messages. This issue isex...

5.5CVSS6.7AI score0.00011EPSS
CVE
CVE
added 2024/07/29 4:15 p.m.128 views

CVE-2024-42068

In the Linux kernel, the following vulnerability has been resolved: bpf: Take return from set_memory_ro() into account with bpf_prog_lock_ro() set_memory_ro() can fail, leaving memory unprotected. Check its return and take it into account as an error.

5.5CVSS6.7AI score0.00014EPSS
CVE
CVE
added 2024/09/18 8:15 a.m.128 views

CVE-2024-46783

In the Linux kernel, the following vulnerability has been resolved: tcp_bpf: fix return value of tcp_bpf_sendmsg() When we cork messages in psock->cork, the last message triggers theflushing will result in sending a sk_msg larger than the currentmessage size. In this case, in tcp_bpf_send_verdic...

5.5CVSS6.1AI score0.00036EPSS
CVE
CVE
added 2024/10/21 7:15 p.m.128 views

CVE-2024-50015

In the Linux kernel, the following vulnerability has been resolved: ext4: dax: fix overflowing extents beyond inode size when partially writing The dax_iomap_rw() does two things in each iteration: map written blocksand copy user data to blocks. If the process is killed by user(See signalhandling i...

5.5CVSS6.9AI score0.00047EPSS
CVE
CVE
added 2024/11/05 6:15 p.m.128 views

CVE-2024-50130

In the Linux kernel, the following vulnerability has been resolved: netfilter: bpf: must hold reference on net namespace BUG: KASAN: slab-use-after-free in __nf_unregister_net_hook+0x640/0x6b0Read of size 8 at addr ffff8880106fe400 by task repro/72=bpf_nf_link_release+0xda/0x1e0bpf_link_free+0x139/...

7.8CVSS7.2AI score0.00048EPSS
CVE
CVE
added 2024/11/09 11:15 a.m.128 views

CVE-2024-50261

In the Linux kernel, the following vulnerability has been resolved: macsec: Fix use-after-free while sending the offloading packet KASAN reports the following UAF. The metadata_dst, which is used tostore the SCI value for macsec offload, is already freed bymetadata_dst_free() in macsec_free_netdev(...

7.8CVSS6.6AI score0.00046EPSS
CVE
CVE
added 2024/11/25 10:15 p.m.128 views

CVE-2024-53099

In the Linux kernel, the following vulnerability has been resolved: bpf: Check validity of link->type in bpf_link_show_fdinfo() If a newly-added link type doesn't invoke BPF_LINK_TYPE(), accessingbpf_link_type_strs[link->type] may result in an out-of-bounds access. To spot such missed invocat...

7.1CVSS6.5AI score0.00046EPSS
CVE
CVE
added 2024/12/04 3:15 p.m.128 views

CVE-2024-53133

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Handle dml allocation failure to avoid crash [Why]In the case where a dml allocation fails for any reason, thecurrent state's dml contexts would no longer be valid. Thensubsequent calls dc_state_copy_internal would...

7.8CVSS6.5AI score0.00047EPSS
Total number of security vulnerabilities7807